Jump to content
Nytro

Stuxnet Under the Microscope

Recommended Posts

Stuxnet Under the Microscope

O analiza detaliata a celor de la ESET.

Aleksandr Matrosov, Senior Virus Researcher

Eugene Rodionov, Rootkit Analyst

David Harley, Senior Research Fellow

Juraj Malcho, Head of Virus Laboratory

Contents
1 INTRODUCTION ................................................................................................................................ 5
1.1 TARGETED ATTACKS ............................................................................................................................. 5
1.2 STUXNET VERSUS AURORA ..................................................................................................................... 7
1.3 STUXNET REVEALED........................................................................................................................... 11
1.4 STATISTICS ON THE SPREAD OF THE STUXNET WORM ................................................................................ 15
2 MICROSOFT, MALWARE AND THE MEDIA ....................................................................................... 17
2.1 SCADA, SIEMENS AND STUXNET .......................................................................................................... 17
2.2 STUXNET TIMELINE............................................................................................................................ 19
3 DISTRIBUTION ................................................................................................................................ 24
3.1 THE LNK EXPLOIT .............................................................................................................................. 24
3.1.1 Propagation via External Storage Devices ............................................................................... 27
3.1.2 Metasploit and WebDAV Exploit .............................................................................................. 27
3.1.3 What Do DLL Hijacking Flaws and the LNK Exploit have in Common? ..................................... 28
3.2 LNK VULNERABILITY IN STUXNET .......................................................................................................... 29
3.3 THE MS10-061 ATTACK VECTOR ......................................................................................................... 31
3.4 NETWORK SHARED FOLDERS AND RPC VULNERABILITY (MS08-067) ......................................................... 34
3.5 0-DAY IN WIN32K.SYS (MS10-073) .................................................................................................... 35
3.6 MS10-092: EXPLOITING A 0-DAY IN TASK SCHEDULER ............................................................................. 40
4 STUXNET IMPLEMENTATION ........................................................................................................... 45
4.1 USER-MODE FUNCTIONALITY ................................................................................................................ 45
4.1.1 Overview of the main module .................................................................................................. 45
4.1.2 Injecting code ........................................................................................................................... 46
4.1.3 Injecting into a current process ................................................................................................ 47
4.1.4 Injecting into a new process ..................................................................................................... 50
4.1.5 Installation ............................................................................................................................... 50
4.1.6 Exported functions.................................................................................................................... 52
4.1.7 RPC Server ............................................................................................................................... 56
4.1.8 Resources ................................................................................................................................ 58
4.2 KERNEL-MODE FUNCTIONALITY ............................................................................................................. 58
4.2.1 MRXCLS.sys ............................................................................................................................... 60
4.2.2 MRXNET.sys .............................................................................................................................. 64
4.3 STUXNET BOT CONFIGURATION DATA .................................................................................................... 65
4.4 REMOTE COMMUNICATION PROTOCOL .................................................................................................. 66
CONCLUSION ......................................................................................................................................... 70
APPENDIX A ........................................................................................................................................... 71
APPENDIX B ........................................................................................................................................... 74
APPENDIX C ........................................................................................................................................... 75
APPENDIX D .......................................................................................................................................... 82
APPENDIX E ........................................................................................................................................... 84

Download:

http://www.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...